Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
fail2ban fail2ban 0.8.3 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2009-0362
filter.d/wuftpd.conf in Fail2ban 0.8.3 uses an incorrect regular expression that allows remote malicious users to cause a denial of service (forced authentication failures) via a crafted reverse-resolved DNS name (rhost) entry that contains a substring that is interpreted as an I...
Fail2ban Fail2ban 0.8.3
NA
CVE-2009-5023
The (1) dshield.conf, (2) mail-buffered.conf, (3) mynetwatchman.conf, and (4) mynetwatchman.conf actions in action.d/ in Fail2ban prior to 0.8.5 allows local users to write to arbitrary files via a symlink attack on temporary files with predictable names, as demonstrated by /tmp/...
Fail2ban Fail2ban 0.4.1
Fail2ban Fail2ban 0.7.4
Fail2ban Fail2ban 0.7.2
Fail2ban Fail2ban 0.1.2
Fail2ban Fail2ban 0.5.0
Fail2ban Fail2ban 0.7.5
Fail2ban Fail2ban 0.7.9
Fail2ban Fail2ban 0.7.1
Fail2ban Fail2ban 0.7.8
Fail2ban Fail2ban 0.5.2
Fail2ban Fail2ban
Fail2ban Fail2ban 0.7.7
Fail2ban Fail2ban 0.8.2
Fail2ban Fail2ban 0.4.0
Fail2ban Fail2ban 0.5.1
Fail2ban Fail2ban 0.8.1
Fail2ban Fail2ban 0.5.3
Fail2ban Fail2ban 0.3.1
Fail2ban Fail2ban 0.8.0
Fail2ban Fail2ban 0.5.4
Fail2ban Fail2ban 0.6.0
Fail2ban Fail2ban 0.5.5
NA
CVE-2012-5642
server/action.py in Fail2ban prior to 0.8.8 does not properly handle the content of the matches tag, which might allow remote malicious users to trigger unsafe behavior in a custom action file via unspecified symbols in this content.
Fail2ban Fail2ban 0.4.1
Fail2ban Fail2ban 0.7.4
Fail2ban Fail2ban 0.7.2
Fail2ban Fail2ban 0.1.2
Fail2ban Fail2ban 0.5.0
Fail2ban Fail2ban 0.7.5
Fail2ban Fail2ban 0.8.6
Fail2ban Fail2ban 0.7.9
Fail2ban Fail2ban 0.7.1
Fail2ban Fail2ban 0.8.7
Fail2ban Fail2ban 0.7.8
Fail2ban Fail2ban 0.5.2
Fail2ban Fail2ban 0.7.7
Fail2ban Fail2ban 0.8.2
Fail2ban Fail2ban 0.4.0
Fail2ban Fail2ban 0.5.1
Fail2ban Fail2ban 0.8.1
Fail2ban Fail2ban 0.5.3
Fail2ban Fail2ban 0.3.1
Fail2ban Fail2ban 0.8.4
Fail2ban Fail2ban 0.8.0
Fail2ban Fail2ban 0.5.4
NA
CVE-2013-7176
config/filter.d/postfix.conf in the postfix filter in Fail2ban prior to 0.8.11 allows remote malicious users to trigger the blocking of an arbitrary IP address via a crafted e-mail address that matches an improperly designed regular expression.
Fail2ban Fail2ban 0.4.1
Fail2ban Fail2ban 0.7.4
Fail2ban Fail2ban 0.7.2
Fail2ban Fail2ban 0.1.2
Fail2ban Fail2ban 0.5.0
Fail2ban Fail2ban 0.7.5
Fail2ban Fail2ban
Fail2ban Fail2ban 0.8.6
Fail2ban Fail2ban 0.7.9
Fail2ban Fail2ban 0.7.1
Fail2ban Fail2ban 0.8.8
Fail2ban Fail2ban 0.8.7
Fail2ban Fail2ban 0.7.8
Fail2ban Fail2ban 0.5.2
Fail2ban Fail2ban 0.7.7
Fail2ban Fail2ban 0.8.7.1
Fail2ban Fail2ban 0.8.2
Fail2ban Fail2ban 0.4.0
Fail2ban Fail2ban 0.5.1
Fail2ban Fail2ban 0.8.1
Fail2ban Fail2ban 0.5.3
Fail2ban Fail2ban 0.3.1
NA
CVE-2013-7177
config/filter.d/cyrus-imap.conf in the cyrus-imap filter in Fail2ban prior to 0.8.11 allows remote malicious users to trigger the blocking of an arbitrary IP address via a crafted e-mail address that matches an improperly designed regular expression.
Fail2ban Fail2ban 0.4.1
Fail2ban Fail2ban 0.7.4
Fail2ban Fail2ban 0.7.2
Fail2ban Fail2ban 0.1.2
Fail2ban Fail2ban 0.5.0
Fail2ban Fail2ban 0.7.5
Fail2ban Fail2ban
Fail2ban Fail2ban 0.8.6
Fail2ban Fail2ban 0.7.9
Fail2ban Fail2ban 0.7.1
Fail2ban Fail2ban 0.8.8
Fail2ban Fail2ban 0.8.7
Fail2ban Fail2ban 0.7.8
Fail2ban Fail2ban 0.5.2
Fail2ban Fail2ban 0.7.7
Fail2ban Fail2ban 0.8.7.1
Fail2ban Fail2ban 0.8.2
Fail2ban Fail2ban 0.4.0
Fail2ban Fail2ban 0.5.1
Fail2ban Fail2ban 0.8.1
Fail2ban Fail2ban 0.5.3
Fail2ban Fail2ban 0.3.1
NA
CVE-2013-2178
The apache-auth.conf, apache-nohome.conf, apache-noscript.conf, and apache-overflows.conf files in Fail2ban prior to 0.8.10 do not properly validate log messages, which allows remote malicious users to block arbitrary IP addresses via certain messages in a request.
Fail2ban Fail2ban 0.4.1
Fail2ban Fail2ban 0.7.4
Fail2ban Fail2ban 0.7.2
Fail2ban Fail2ban 0.1.2
Fail2ban Fail2ban 0.5.0
Fail2ban Fail2ban 0.7.5
Fail2ban Fail2ban 0.8.6
Fail2ban Fail2ban 0.7.9
Fail2ban Fail2ban 0.7.1
Fail2ban Fail2ban 0.8.8
Fail2ban Fail2ban 0.8.7
Fail2ban Fail2ban 0.7.8
Fail2ban Fail2ban 0.5.2
Fail2ban Fail2ban 0.7.7
Fail2ban Fail2ban 0.8.7.1
Fail2ban Fail2ban 0.8.2
Fail2ban Fail2ban 0.4.0
Fail2ban Fail2ban 0.5.1
Fail2ban Fail2ban 0.8.1
Fail2ban Fail2ban 0.5.3
Fail2ban Fail2ban 0.3.1
Fail2ban Fail2ban 0.8.4
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started